CVE-2019-13235
Description
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An XSS vulnerability in the Alkacon OpenCms Apollo Template login form allows attackers to inject arbitrary web scripts without authentication.
Vulnerability
Overview The Alkacon OpenCms Apollo Template versions 10.5.4 and 10.5.5 contain a stored or reflected cross-site scripting (XSS) vulnerability in the login form. The official description confirms that improper handling of user input within the login form enables script injection [1][2]. This type of flaw occurs when the application fails to sanitize or encode input before embedding it in the page response, allowing an attacker to break out of the HTML context and execute arbitrary JavaScript in the victim's browser.
Attack
Vector and Prerequisites The vulnerability is present in the login form, which is typically accessible without authentication. An attacker can craft a malicious link or input that, when processed by the vulnerable form, injects a script payload. No authentication is required to reach the login page, and the attack does not require a privileged network position if the target system is exposed to the internet. The exploit can be delivered via a link or by directly submitting crafted data to the login endpoint [1].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session on the affected OpenCms instance. This can lead to session hijacking, defacement, credential theft, or redirection to malicious sites. Since the vulnerability exists in a public-facing component, the risk to confidentiality, integrity, and availability is elevated.
Remediation
Status The vulnerability has been addressed in subsequent commits to the Apollo Template repository on the branch_10_5_x branch [3]. Users should update to a patched version of the Apollo Template. According to the advisory on Packet Storm, the vendor was notified and a fix was prepared [1]. Organizations using the affected versions should apply the update as soon as possible to mitigate the risk.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.opencms:opencms-coreMaven | < 11.0.1 | 11.0.1 |
Affected products
2- Alkacon/OpenCms Apollo Templatedescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-2p6p-v69p-9mm9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-13235ghsaADVISORY
- packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.htmlghsax_refsource_MISCWEB
- aetsu.github.io/OpenCmsghsax_refsource_MISCWEB
- github.com/alkacon/apollo-template/commits/branch_10_5_xghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.